API DAST Configuration Patterns¶
The configuration patterns for API DAST are structurally similar to WebApp DAST examples, with the following modifications:
- Authentication Type: Replace
browser_agentwith appropriate API authentication methods (http_basic,bearer_token,cookie,header, ormanual) - Network Parameter: The
network.ff_frontend_next_senderparameter is not required for API DAST scans - Frontend DAST Block: Remove the
frontend_dastconfiguration block
API DAST Example (Tenant Isolation Pattern)¶
Configuration:
authentication:
presets:
- type: bearer_token
users:
- username: user@tenant-a.com
token: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...
main_user: true
- username: user@tenant-b.com
token: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...
security_tests:
tenant_isolation:
skip: false
main_user: user@tenant-a.com
This configuration validates tenant isolation for API endpoints by replaying requests with different bearer tokens and comparing response fingerprints.
Configuration Decision Tree¶
Should you use a single scan profile with multiple users, or multiple scan profiles?
Use a Single Scan Profile When:¶
- All secondary users should be tested for their ability to access the Main User's data
- The Main User has the broadest feature access (ensuring maximum coverage)
- Testing direction is unidirectional (secondary users → Main User)
Use Multiple Scan Profiles When:¶
- Bidirectional authorization testing is required (asymmetric permissions)
- Different users have access to mutually exclusive features that must all be tested
- Independent exploration of multiple user roles is necessary (Use Case 1)
Example Decision¶
Scenario: Testing a SaaS application with Admin, Manager, and Standard User roles
Question: Should this be one scan or three scans?
Answer: Depends on testing objectives:
- Single Scan: If the goal is to validate that Manager and Standard User cannot access Admin data (one scan with Admin as Main User)
- Multiple Scans: If the goal is to validate all three combinations (Admin→Manager, Manager→Admin, Standard→Manager requires three scans)
- Use Case 1: If each role interacts with fundamentally different features requiring independent exploration (three separate scans)
Summary¶
| Scenario | Number of Scans | Main User Selection | Secondary Users |
|---|---|---|---|
| Symmetric tenant isolation (Use Case 2) | 1 | Any tenant user | Other tenant users |
| Asymmetric permissions - unidirectional (Use Case 3, partial) | 1 | Higher privilege user | Lower privilege users |
| Asymmetric permissions - bidirectional (Use Case 3, complete) | 2 | Reverse in each scan | Opposite user |
| Independent user exploration (Use Case 1) | N (number of roles) | Each role separately | None or for additional isolation testing |
| Multiple authorization boundaries against one user | 1 | Most privileged user | All other users |